扫描报告
20 /100
claude-bridge
Bridge to local Claude Code CLI - no API key required. Creates task files and shell scripts, then executes Claude Code locally via subprocess.
Legitimate Claude Code CLI bridge with no malicious behavior; minor documentation gaps around subprocess usage.
可以安装
Add explicit subprocess.run() declaration to SKILL.md and consider using shlex.quote() for prompt escaping to prevent shell injection edge cases.
安全发现 4 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | Shell script injection surface in create_task() | claude_bridge.py:54 |
| 低危 | subprocess.run() not explicitly declared in SKILL.md | SKILL.md:1 |
| 提示 | Allowed tools restriction is a good security measure | claude_bridge.py:72 |
| 提示 | Task execution scoped to local directories | claude_bridge.py:68 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 文件系统 | WRITE | WRITE | ✓ 一致 | claude_bridge.py:54-69 writes task JSON and shell scripts to tasks/ directory |
| 命令执行 | WRITE | WRITE | ✓ 一致 | claude_bridge.py:86-90 uses subprocess.run() to execute bash scripts |
| 网络访问 | NONE | NONE | — | No direct network calls in claude_bridge.py; Claude Code CLI handles API calls s… |
1 项发现
中危 外部 URL 外部 URL
https://coding.dashscope.aliyuncs.com/apps/anthropic results/analyze_claude_code_source.txt:4 目录结构
51 文件 · 47.0 KB · 1175 行 Shell 13f · 370L
Text 13f · 287L
Python 1f · 252L
Markdown 1f · 165L
JSON 23f · 101L
├─
▾
results
│ ├─
analyze_claude_code_source.txt
Text
│ ├─
analyze_commands_system.json
JSON
│ ├─
analyze_commands_system.txt
Text
│ ├─
analyze_query_engine.json
JSON
│ ├─
analyze_query_engine.txt
Text
│ ├─
analyze_tools_system.json
JSON
│ ├─
analyze_tools_system.txt
Text
│ ├─
fix_db_cache_002.json
JSON
│ ├─
fix_db_cache_002.txt
Text
│ ├─
fix_db_kairos_001.json
JSON
│ ├─
fix_db_kairos_001.txt
Text
│ ├─
fix_db_memory_003.json
JSON
│ ├─
fix_db_memory_003.txt
Text
│ ├─
fix_web_ui_full_access.txt
Text
│ ├─
fix_web_ui_missing_files.json
JSON
│ ├─
fix_web_ui_missing_files.txt
Text
│ ├─
manual_1775136627.json
JSON
│ ├─
manual_1775136627.txt
Text
│ ├─
manual_1775199172.json
JSON
│ ├─
manual_1775199172.txt
Text
│ ├─
optimize_web_components.txt
Text
│ ├─
test_fix_001.json
JSON
│ └─
test_fix_001.txt
Text
├─
▾
tasks
│ ├─
analyze_claude_code_source.json
JSON
│ ├─
analyze_claude_code_source.sh
Shell
│ ├─
analyze_commands_system.json
JSON
│ ├─
analyze_commands_system.sh
Shell
│ ├─
analyze_query_engine.json
JSON
│ ├─
analyze_query_engine.sh
Shell
│ ├─
analyze_tools_system.json
JSON
│ ├─
analyze_tools_system.sh
Shell
│ ├─
fix_db_cache_002.json
JSON
│ ├─
fix_db_cache_002.sh
Shell
│ ├─
fix_db_kairos_001.json
JSON
│ ├─
fix_db_kairos_001.sh
Shell
│ ├─
fix_db_memory_003.json
JSON
│ ├─
fix_db_memory_003.sh
Shell
│ ├─
fix_web_ui_full_access.json
JSON
│ ├─
fix_web_ui_full_access.sh
Shell
│ ├─
fix_web_ui_missing_files.json
JSON
│ ├─
fix_web_ui_missing_files.sh
Shell
│ ├─
manual_1775136627.json
JSON
│ ├─
manual_1775136627.sh
Shell
│ ├─
manual_1775199172.json
JSON
│ ├─
manual_1775199172.sh
Shell
│ ├─
optimize_web_components.json
JSON
│ ├─
optimize_web_components.sh
Shell
│ ├─
test_fix_001.json
JSON
│ └─
test_fix_001.sh
Shell
├─
claude_bridge.py
Python
└─
SKILL.md
Markdown
依赖分析 1 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
python3 | system | stdlib | 否 | No external dependencies; uses only Python standard library (subprocess, json, os, time, pathlib) |
安全亮点
✓ No credential harvesting: no access to ~/.ssh, ~/.aws, .env, or similar sensitive paths
✓ No data exfiltration: no POST requests to external IPs; all results stored locally
✓ No obfuscation techniques: no base64, eval(), or atob() patterns found
✓ Allowed tools restriction (Read,Edit,Bash only) limits Claude Code's capabilities
✓ Task execution is scoped to the skill's own directory
✓ No curl|bash or wget|sh remote script execution patterns
✓ No hidden instructions in HTML comments or other files
✓ Code is readable and straightforward with no suspicious patterns